The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The paper discusses relations between political mobilization, security and political relations. Security is understood as a social phenomenon, clearly explained by Clausewitz in his book On War. According to Clausewitz, political relations are of key significance for understanding the phenomenon of security. This thesis is not challenged, however, it is necessary to explain why political relations...
One of the key problems of our time is how much security we want, what price we are willing to pay to feel safe and whether safety leads to satisfaction. Security has a financial and political cost. The article focuses on the relationship between security and privacy from the point of view of a citizen. It examines Czech and Slovak citizen attitudes toward the use of strong prevention security measures...
The growth of electronic devices connected to the Internet brings new concerns. These include security, privacy, user rights, data generation, spectrum management, and liability. Countries and organizations are developing policies to accommodate the Internet of Things (IoT). In this paper, we identified IoT indicators useful for policy makers. We considered four categories of indicators. These were:...
With the launch of smart government initiatives, it is important to analyze the security requirements that will enable the decision makers to successfully carry out the process of transformation to mobile government (M-Government). This paper presents a security analysis using the security requirements engineering SQUARE method in the context of the M-Government transformation. The mobile application...
The article considers public safety as the main trends in political and economic international relations that ensure inter-state “balance of interests”. Given the characteristics of its structure, place and role in the governance of the States. The authors propose the balance of priorities in solving problems in the global scale of the space in terms of development of mutually beneficial political...
Citizen criminality has become an important social problem in Lima city, due to the fact that the number of crimes has increased. In this study, we conducted a citizen criminality assessment using the grey clustering method, which is based on grey systems theory. The case study was conducted on 32 districts from Lima, Peru. Consequently, a map on the citizen criminality situation was obtained. The...
This paper will initially describe the electricity infrastructure in Sri Lanka, covering history, current status, and future directions. Secondly, it will explore the costs of electricity generated by different sources including initial capital, return on investment, as well as the costs of continuous operation, fuel, and maintenance in the context of Sri Lanka. It will then review the different requirements...
The ideology carried by audio-visual product has a strong influence and guidance function. This paper starts from make a basic overview on audio-visual product industry ideology's security, construct the evaluation system of audio-visual product industry security, analyze the current situation and existing problems of audio-visual product industry ideology's security in China, and puts forward an...
The most fundamental reasons for financial support for agricultural development include ensuring national food security and increasing rural incomes. The designated use of special transfer payments will be more conducive to the goal of increasing food production and increasing the incomes of farmers. However, such problems as here are many problems such as the inefficiencies in the use of agricultural...
By analyzing the factors for the risk of bank bankruptcy in China, this paper points out that the bankruptcy risk in Chinese banking appears in the form of a chaotic system. In bank operation, risk factors influence one another, and get aggravated along, so it is hard to distinguish the initial risk. Therefore, to handle related risks, it is a must to start with each and every risk factor.
The security of cultural industrial structural is one of the important contents of cultural industry research. On the basis of defining the security of cultural industrial structure, this paper analyzes the cultural industry policy factors which affect the security of cultural industry structure. They are talent policies, fiscal and financial policies, incentives and incentives policies, and international...
According to the second national sample survey of disabled people, the number of disabled people reaches 82,960,000 in China, which accounts 6.34% of the total population In the same year, the number of disabled people from Beijing is 999,000, which accounts for 6.49% of all populations of the city. If calculated according to the proportion, the number of people of disabled people would be reach 1,409,000...
As a type of municipal public utilities, urban public transport is looking at more interventions from the government in many countries. Its industrial security should be paid more attention to in the studies of industrial security. The paper aims at defining industrial security of urban public transport and discovering its unique features on the basis of analyzing the factors affecting it and their...
This paper aims to propose regulatory recommendations for IoT smart-health care service, by using the method of Privacy Impact Assessment (PIA). We utilize data from a relevant IoT smart-health care project in Indonesia. On structuring the final regulatory recommendations, we have conducted in-depth interview to the stake holders of Indonesian IoT smart-health care service. The results show that there...
This manuscript intends to explore the application of a specific secure data environment within different prototypes of information sharing. It focuses on data management with confidence and agility for the exchange of information. Through discussion and examples, the paper explores the landscape surrounding sensitive data sets. In particular, the paper looks at the application of data sharing related...
The increasing relevance of information assurance in cloud computing has forced governments and stakeholders to turn their attention to Information Technology (IT) security certifications and standards. The introduction of new frameworks such as FedRAMP in the US and C5 in Germany is aimed to raise the level of protection against threats and vulnerabilities unique to cloud computing. However, our...
In the past twenty years the energy consumption of the world has grown significantly. There are many countries for which it is a huge challenge to ensure energy reliability and security. This situation is even getting more intense with the upcoming spread of renewable energy sources and the continuous need of lowering CO2 emission. Nuclear energy which is a possible solution for both difficulties...
The discipline of Homeland Security is gaining wider traction especially after the horrendous attack on the world trade center, the USA in 2001. Recently national governments are very seriously and sincerely putting a lot of emphasis and efforts on national security aspects that implicitly cover the safety and security of people, infrastructures, and resources. It is overwhelmingly acknowledged that...
The synchronization of stock price in recent years is the hot topic of corporate finance. In this paper, we use the data of A share listed companies in China in 2010–2015 to study the barrier of separation of two rights (control right and cash flow right) to market information transmission characterized by stock price synchronization. The results show that: firstly, the separation of the two powers...
E-government success requires leadership, huge funds and efforts to overcome the challenges faced by governments especially in developing countries. Cloud computing is an option that can provide governments with lower infrastructure costs and less initial investment than proprietary systems. Other benefits like scalability and flexibility will make cloud computing a tempting option. On the other hand,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.